• Home
  • Disclaimer
  • Guides
  • Editor
  • Downloads
  • News
  • Home
  • Archive by category "Security"

Category Security

Lacey Kapp
Feb 23, 2018

Describe the issues associated with troubleshooting different routing protocols

Routing is at the core of the internet; a demarcation point separates the public network from a customer’s private network whilst routing protocols determine how routers communicate with each other,

Read More

No Comments InRouting Trouble Shooting
Lacey Kapp
Feb 23, 2018

Explain the approach in troubleshooting a complex network infrastructure

In an organization the potential loss of revenue and reputation due to a network outage or a data breach (Chemweno et al, 2015), are driving enterprises to consider adopting a Network Maintenance Plan.

Read More

No Comments InTrouble Shooting
Lacey Kapp
Feb 23, 2018

Explore and explain in detail how a Cisco switch may be configured for security

Maintaining a secure network protects users and secures commercial interests in an enterprise even though a Risk Management Strategy’s focus is mainly on environmental factors and securing Edge Devices,

Read More

No Comments InSecurity Switching
Lacey Kapp
Feb 23, 2018

Critically compare HSRP to VRRP or GLBP, discussing the benefits and potential weaknesses of each

The driving force in implementing First Hop Redundancy Protocols (FHRP) in a Cisco centric High Availability Campus network design has been the reducing cost of Layer 3 devices and more importantly the potential loss of revenue in the event of a network outage to an Enterprise (Pavlik et al, 2014).

Read More

No Comments InSwitching
Lacey Kapp
Feb 23, 2018

Rapid Spanning Tree Protocol

In multi-switching environments, the drive for backup link redundancy has introduced bridging loops into the network as frames are continuously forwarded.

Read More

No Comments InSwitching
Lacey Kapp
Feb 23, 2018

Discuss the strengths and weaknesses of redistribution between two different IGP

In most cases a prudent approach would be to introduce the main theme of the strengths and weaknesses of Route Redistribution between different Autonomous Systems running different IGP (Interior Gateway protocols).

Read More

No Comments InRouting
Lacey Kapp
Feb 22, 2018

Border Gateway Protocol

The modern internet is constructed around a concept of Autonomous Systems (ASes) that uses the Border Gateway Protocol (BGP) for routing traffic between ASes.

Read More

No Comments InRouting
Lacey Kapp
Feb 22, 2018

A critical evaluation of two complex interior routing gateway protocols

Interior Gateway Routing protocol is a protocol that “distributes routing information between routers belonging to an Autonomous System” (Moy, J., 1998) whereby computers or any device able to connect to the network can exchange data within their own domain and beyond by being routed externally through a border router.

Read More

No Comments InRouting
Lacey Kapp
Feb 22, 2018

A critical review of the Logjam Threat

LOGJAM A PRODUCT OF THE NSA?
A group of university researchers have discovered a vulnerability affecting the Diffie-Hellman key exchange which makes it susceptible to an attack called Logjam.

Read More

No Comments InSecurity
Lacey Kapp
Feb 22, 2018

Encrypt messages discussing different ways of exchanging the secret key

Two different methods to meet the criteria for a secure exchange of the secret key whilst limiting the possibility of interception and it being manipulated whilst in transit are The Public Key Encryption and Diffie-Hellman.

Read More

No Comments InSecurity

SkyZoneTech | All rights reserved